1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
13

When admitting digital evidence at trial, the issue of ________ comes up when the evidence involves computer-generated records.

Computers and Technology
1 answer:
kari74 [83]3 years ago
5 0

Answer:

When admitting digital evidence at trial, the issue of <u>Authenticity</u> comes up when the evidence involves computer-generated records.

Explanation:

The digital evidence such as video, audio or some pictures have been presented before court as evidence. The first question that may arise is related to "authenticity of the material". To authenticate that evidence court may order the forensic audit of that particular evidence.

<em>So, the issue of authenticity of evidence will arise, in case of digital evidence.</em>

You might be interested in
Computers and Technology:
Monica [59]

Answer:

The algorithm:

Input days

sum = 0

for i = 1 to days

   input text

   sum = sum + text

end for

average = sum/days

print average

The program in pascal:

var days, sum, text, i:integer;

var average : real;

Begin

    write ('Days: '); readln(days);

    sum:=0;

    for i := 1 to days do begin

         write ('Text: ');  readln(text);  

         sum:=sum+text;

    end;

    average := (sum/days);

    writeln ('The average text is' , average);

End.

Explanation:

This declares all variables

var days, sum, text, i:integer;

var average : real;

This begins the program

Begin

This gets the number of days from the user

    write ('Days: '); readln(days);

Initialize sum to 0

    sum:=0;

This iterates through the days

    for i := 1 to days do begin

This gets the text for each day

         write ('Text: ');   readln(text);  

This sums up the texts

         sum:=sum+text;

End loop

    end;

Calculate average

    average := (sum/days);

Print average

    writeln ('The average text is' , average);

End program

End.

3 0
3 years ago
The latest form of personal communication that most resembles a public journal is a _____.
Airida [17]
The answer is b becuase a daily blog is a daily journal
8 0
3 years ago
Read 2 more answers
Select the proper ergonomic keyboarding techniques.
SCORPION-xisa [38]

Answer:

The correct options are;

-Position the keyboard directly in front and close to you so you don't have an excessive reach

-Keep your shoulders, arms, hands and fingers relaxed

-Position your wrists straight or in neutral position while typing

-Adjust your chair height and position so your feet rest flat on the floor, or add a footrest to compensate for a higher chair

-Adjust the keyboard height so that your shoulders can relax and your arms are straight in front of you

Explanation:

1) It is important to keep the fingers in a relaxed position when typing

2) Ensure to type in a tapping fashion when typing rather than pressing on the keys of the keyboard

3) The fingernails should be kept short when frequent typing is done

4) The wrist is better kept above the keyboard than resting on it

5) Ensure that the mouse is easily reached.

4 0
3 years ago
Does anyone know how many Brainliests you need to be able to send a private message to someone??
White raven [17]

Answer:

no idea sorry...

Explanation:

8 0
2 years ago
Read 2 more answers
Este tipo de software sirve para controlar e interactuar con el sistema operativo, proporcionando control sobre el hardware y da
attashe74 [19]

Answer: c

Explanation:

4 0
2 years ago
Other questions:
  • You are troubleshooting an interface issue on your cisco ios isr. the output of "show ip interface brief" indicates that etherne
    11·1 answer
  • Using the Invert Selection tool while something is selected in Paint will __________.
    14·1 answer
  • You have been asked to create a Community leveraging Out-of-the-box login, logout, self-registration, and error pages. Would you
    5·1 answer
  • The equation x + y2-4x+2y=b describes a circle.
    8·1 answer
  • A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr
    13·1 answer
  • 1. cybersquatting refers to the tampering of existing web sites and selling unrelated products (true or false)
    8·1 answer
  • How do you mark peoples answer as the brainliest answer? I have trouble doing so. Please help!
    10·2 answers
  • Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
    15·1 answer
  • Write a function process_spec that takes a dictionary (cmap), a list (spec) and a Boolean variable (Button A) as arguments and r
    10·1 answer
  • Which of the following is true of binary files?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!